s4:SAMR RPC - Fix the criteria for group searches
[ira/wip.git] / source4 / rpc_server / samr / dcesrv_samr.c
index e354df7f4113f606b9400b76f2e3c3bd598f3618..7de2377fe9e48a9418f66ea0b2b1b14d400c631e 100644 (file)
@@ -165,7 +165,7 @@ static NTSTATUS dcesrv_samr_Connect(struct dcesrv_call_state *dce_call, TALLOC_C
 
        ZERO_STRUCTP(r->out.connect_handle);
 
-       c_state = talloc(dce_call->conn, struct samr_connect_state);
+       c_state = talloc(mem_ctx, struct samr_connect_state);
        if (!c_state) {
                return NT_STATUS_NO_MEMORY;
        }
@@ -398,7 +398,7 @@ static NTSTATUS dcesrv_samr_OpenDomain(struct dcesrv_call_state *dce_call, TALLO
                return NT_STATUS_INVALID_PARAMETER;
        }
 
-       d_state = talloc(c_state, struct samr_domain_state);
+       d_state = talloc(mem_ctx, struct samr_domain_state);
        if (!d_state) {
                return NT_STATUS_NO_MEMORY;
        }
@@ -518,14 +518,14 @@ static NTSTATUS dcesrv_samr_info_DomGeneralInformation(struct samr_domain_state
        }
 
        /* No users in BUILTIN, and the LOCAL group types are only in builtin, and the global group type is never in BUILTIN */
-       info->num_users = samdb_search_count(state->sam_ctx, mem_ctx, state->domain_dn, 
+       info->num_users = samdb_search_count(state->sam_ctx, state->domain_dn,
                                             "(objectClass=user)");
-       info->num_groups = samdb_search_count(state->sam_ctx, mem_ctx, state->domain_dn,
-                                             "(&(objectClass=group)(sAMAccountType=%u))",
-                                             ATYPE_GLOBAL_GROUP);
-       info->num_aliases = samdb_search_count(state->sam_ctx, mem_ctx, state->domain_dn,
-                                              "(&(objectClass=group)(sAMAccountType=%u))",
-                                              ATYPE_LOCAL_GROUP);
+       info->num_groups = samdb_search_count(state->sam_ctx, state->domain_dn,
+                                             "(&(objectClass=group)(groupType=%u))",
+                                             GTYPE_SECURITY_GLOBAL_GROUP);
+       info->num_aliases = samdb_search_count(state->sam_ctx, state->domain_dn,
+                                              "(&(objectClass=group)(groupType=%u))",
+                                              GTYPE_SECURITY_DOMAIN_LOCAL_GROUP);
 
        return NT_STATUS_OK;
 }
@@ -797,8 +797,10 @@ static NTSTATUS dcesrv_samr_QueryDomainInfo(struct dcesrv_call_state *dce_call,
                break;
        }
        case 9:
+       {
                attrs = NULL;
-               break;          
+               break;
+       }
        case 11:
        {
                static const char * const attrs2[] = { "oEMInformation",
@@ -828,6 +830,10 @@ static NTSTATUS dcesrv_samr_QueryDomainInfo(struct dcesrv_call_state *dce_call,
                attrs = attrs2;
                break;
        }
+       default:
+       {
+               return NT_STATUS_INVALID_INFO_CLASS;
+       }
        }
 
        /* some levels don't need a search */
@@ -881,9 +887,9 @@ static NTSTATUS dcesrv_samr_QueryDomainInfo(struct dcesrv_call_state *dce_call,
        case 13:
                return dcesrv_samr_info_DomInfo13(d_state, mem_ctx, dom_msgs, 
                                                  &info->info13);
+       default:
+               return NT_STATUS_INVALID_INFO_CLASS;
        }
-
-       return NT_STATUS_INVALID_INFO_CLASS;
 }
 
 
@@ -1040,7 +1046,7 @@ static NTSTATUS dcesrv_samr_CreateDomainGroup(struct dcesrv_call_state *dce_call
                return NT_STATUS_INTERNAL_DB_CORRUPTION;
        }
 
-       a_state = talloc(d_state, struct samr_account_state);
+       a_state = talloc(mem_ctx, struct samr_account_state);
        if (!a_state) {
                return NT_STATUS_NO_MEMORY;
        }
@@ -1296,7 +1302,7 @@ static NTSTATUS dcesrv_samr_CreateUser2(struct dcesrv_call_state *dce_call, TALL
        }
 
        /* add core elements to the ldb_message for the user */
-       msg->dn = ldb_dn_copy(mem_ctx, d_state->domain_dn);
+       msg->dn = ldb_dn_copy(msg, d_state->domain_dn);
        if ( ! ldb_dn_add_child_fmt(msg->dn, "CN=%s,%s", cn_name, container)) {
                ldb_transaction_cancel(d_state->sam_ctx);
                return NT_STATUS_FOOBAR;
@@ -1333,7 +1339,7 @@ static NTSTATUS dcesrv_samr_CreateUser2(struct dcesrv_call_state *dce_call, TALL
                return NT_STATUS_INTERNAL_DB_CORRUPTION;
        }
 
-       a_state = talloc(d_state, struct samr_account_state);
+       a_state = talloc(mem_ctx, struct samr_account_state);
        if (!a_state) {
                ldb_transaction_cancel(d_state->sam_ctx);
                return NT_STATUS_NO_MEMORY;
@@ -1344,7 +1350,7 @@ static NTSTATUS dcesrv_samr_CreateUser2(struct dcesrv_call_state *dce_call, TALL
        a_state->account_dn = talloc_steal(a_state, msg->dn);
 
        /* retrieve the sid and account control bits for the user just created */
-       ret = gendb_search_dn(d_state->sam_ctx, a_state,
+       ret = gendb_search_dn(d_state->sam_ctx, mem_ctx,
                              msg->dn, &msgs, attrs);
 
        if (ret != 1) {
@@ -1614,7 +1620,7 @@ static NTSTATUS dcesrv_samr_CreateDomAlias(struct dcesrv_call_state *dce_call, T
                return NT_STATUS_INTERNAL_DB_CORRUPTION;
        }
 
-       a_state = talloc(d_state, struct samr_account_state);
+       a_state = talloc(mem_ctx, struct samr_account_state);
        if (!a_state) {
                return NT_STATUS_NO_MEMORY;
        }
@@ -2043,7 +2049,7 @@ static NTSTATUS dcesrv_samr_OpenGroup(struct dcesrv_call_state *dce_call, TALLOC
                return NT_STATUS_INTERNAL_DB_CORRUPTION;
        }
 
-       a_state = talloc(d_state, struct samr_account_state);
+       a_state = talloc(mem_ctx, struct samr_account_state);
        if (!a_state) {
                return NT_STATUS_NO_MEMORY;
        }
@@ -2300,6 +2306,7 @@ static NTSTATUS dcesrv_samr_DeleteDomainGroup(struct dcesrv_call_state *dce_call
                return NT_STATUS_UNSUCCESSFUL;
        }
 
+       talloc_free(h);
        ZERO_STRUCTP(r->out.group_handle);
 
        return NT_STATUS_OK;
@@ -2519,7 +2526,7 @@ static NTSTATUS dcesrv_samr_OpenAlias(struct dcesrv_call_state *dce_call, TALLOC
                return NT_STATUS_INTERNAL_DB_CORRUPTION;
        }
 
-       a_state = talloc(d_state, struct samr_account_state);
+       a_state = talloc(mem_ctx, struct samr_account_state);
        if (!a_state) {
                return NT_STATUS_NO_MEMORY;
        }
@@ -2646,7 +2653,7 @@ static NTSTATUS dcesrv_samr_SetAliasInfo(struct dcesrv_call_state *dce_call, TAL
 
        /* modify the samdb record */
        ret = ldb_modify(a_state->sam_ctx, msg);
-       if (ret != 0) {
+       if (ret != LDB_SUCCESS) {
                /* we really need samdb.c to return NTSTATUS */
                return NT_STATUS_UNSUCCESSFUL;
        }
@@ -2672,10 +2679,11 @@ static NTSTATUS dcesrv_samr_DeleteDomAlias(struct dcesrv_call_state *dce_call, T
        a_state = h->data;
 
        ret = ldb_delete(a_state->sam_ctx, a_state->account_dn);
-       if (ret != 0) {
+       if (ret != LDB_SUCCESS) {
                return NT_STATUS_UNSUCCESSFUL;
        }
 
+       talloc_free(h);
        ZERO_STRUCTP(r->out.alias_handle);
 
        return NT_STATUS_OK;
@@ -2962,6 +2970,7 @@ static NTSTATUS dcesrv_samr_DeleteUser(struct dcesrv_call_state *dce_call, TALLO
                return NT_STATUS_UNSUCCESSFUL;
        }
 
+       talloc_free(h);
        ZERO_STRUCTP(r->out.user_handle);
 
        return NT_STATUS_OK;
@@ -3145,6 +3154,10 @@ static NTSTATUS dcesrv_samr_QueryUserInfo(struct dcesrv_call_state *dce_call, TA
                attrs = attrs2;
                break;
        }
+       case 18:
+       {
+               return NT_STATUS_NOT_SUPPORTED;
+       }
        case 20:
        {
                static const char * const attrs2[] = {"userParameters",
@@ -3180,6 +3193,17 @@ static NTSTATUS dcesrv_samr_QueryUserInfo(struct dcesrv_call_state *dce_call, TA
                attrs = attrs2;
                break;
        }
+       case 23:
+       case 24:
+       case 25:
+       case 26:
+       {
+               return NT_STATUS_NOT_SUPPORTED;
+       }
+       default:
+       {
+               return NT_STATUS_INVALID_INFO_CLASS;
+       }
        }
 
        /* pull all the user attributes */
@@ -3611,14 +3635,16 @@ static NTSTATUS dcesrv_samr_SetUserInfo(struct dcesrv_call_state *dce_call, TALL
        }
 
        /* modify the samdb record */
-       ret = ldb_modify(a_state->sam_ctx, msg);
-       if (ret != LDB_SUCCESS) {
-               DEBUG(1,("Failed to modify record %s: %s\n",
-                        ldb_dn_get_linearized(a_state->account_dn),
-                        ldb_errstring(a_state->sam_ctx)));
-
-               /* we really need samdb.c to return NTSTATUS */
-               return NT_STATUS_UNSUCCESSFUL;
+       if (msg->num_elements > 0) {
+               ret = ldb_modify(a_state->sam_ctx, msg);
+               if (ret != LDB_SUCCESS) {
+                       DEBUG(1,("Failed to modify record %s: %s\n",
+                                ldb_dn_get_linearized(a_state->account_dn),
+                                ldb_errstring(a_state->sam_ctx)));
+
+                       /* we really need samdb.c to return NTSTATUS */
+                       return NT_STATUS_UNSUCCESSFUL;
+               }
        }
 
        return NT_STATUS_OK;
@@ -4022,10 +4048,10 @@ static NTSTATUS dcesrv_samr_RemoveMemberFromForeignDomain(struct dcesrv_call_sta
                }
 
                if (samdb_msg_add_delval(d_state->sam_ctx, mem_ctx, mod,
-                                        "member", memberdn) != 0)
+                                        "member", memberdn) != LDB_SUCCESS)
                        return NT_STATUS_NO_MEMORY;
 
-               if (ldb_modify(d_state->sam_ctx, mod) != 0)
+               if (ldb_modify(d_state->sam_ctx, mod) != LDB_SUCCESS)
                        return NT_STATUS_UNSUCCESSFUL;
 
                talloc_free(mod);
@@ -4174,7 +4200,9 @@ static NTSTATUS dcesrv_samr_GetDomPwInfo(struct dcesrv_call_state *dce_call, TAL
 
        ZERO_STRUCTP(r->out.info);
 
-       sam_ctx = samdb_connect(mem_ctx, dce_call->event_ctx, dce_call->conn->dce_ctx->lp_ctx, dce_call->conn->auth_state.session_info); 
+       sam_ctx = samdb_connect(mem_ctx, dce_call->event_ctx,
+                                        dce_call->conn->dce_ctx->lp_ctx,
+                                        dce_call->conn->auth_state.session_info);
        if (sam_ctx == NULL) {
                return NT_STATUS_INVALID_SYSTEM_SERVICE;
        }
@@ -4183,10 +4211,14 @@ static NTSTATUS dcesrv_samr_GetDomPwInfo(struct dcesrv_call_state *dce_call, TAL
        ret = gendb_search_dn(sam_ctx, 
                           mem_ctx, NULL, &msgs, attrs);
        if (ret <= 0) {
+               talloc_free(sam_ctx);
+
                return NT_STATUS_NO_SUCH_DOMAIN;
        }
        if (ret > 1) {
                talloc_free(msgs);
+               talloc_free(sam_ctx);
+
                return NT_STATUS_INTERNAL_DB_CORRUPTION;
        }
 
@@ -4196,7 +4228,7 @@ static NTSTATUS dcesrv_samr_GetDomPwInfo(struct dcesrv_call_state *dce_call, TAL
                "pwdProperties", 1);
 
        talloc_free(msgs);
-       talloc_free(sam_ctx);
+       talloc_unlink(mem_ctx, sam_ctx);
 
        return NT_STATUS_OK;
 }
@@ -4345,15 +4377,56 @@ static NTSTATUS dcesrv_samr_SetDsrmPassword(struct dcesrv_call_state *dce_call,
 
 
 /* 
-  samr_ValidatePassword 
+  samr_ValidatePassword
+
+  For now the call checks the password complexity (if active) and the minimum
+  password length on level 2 and 3. Level 1 is ignored for now.
 */
-static NTSTATUS dcesrv_samr_ValidatePassword(struct dcesrv_call_state *dce_call, TALLOC_CTX *mem_ctx,
-                                     struct samr_ValidatePassword *r)
+static NTSTATUS dcesrv_samr_ValidatePassword(struct dcesrv_call_state *dce_call,
+                                            TALLOC_CTX *mem_ctx,
+                                            struct samr_ValidatePassword *r)
 {
-       /* just say it's OK for now - we need to hook this into our
-          password strength code later */
-       DEBUG(0,(__location__ ": Faking samr_ValidatePassword reply\n"));
+       struct samr_GetDomPwInfo r2;
+       struct samr_PwInfo pwInfo;
+       DATA_BLOB password;
+       enum samr_ValidationStatus res;
+       NTSTATUS status;
+
        (*r->out.rep) = talloc_zero(mem_ctx, union samr_ValidatePasswordRep);
+
+       r2.in.domain_name = NULL;
+       r2.out.info = &pwInfo;
+       status = dcesrv_samr_GetDomPwInfo(dce_call, mem_ctx, &r2);
+       if (!NT_STATUS_IS_OK(status)) {
+               return status;
+       }
+
+       switch (r->in.level) {
+       case NetValidateAuthentication:
+               /* we don't support this yet */
+               return NT_STATUS_NOT_SUPPORTED;
+       break;
+       case NetValidatePasswordChange:
+               password = data_blob_const(r->in.req->req2.password.string,
+                                          r->in.req->req2.password.length);
+               res = samdb_check_password(&password,
+                                          pwInfo.password_properties,
+                                          pwInfo.min_password_length);
+               (*r->out.rep)->ctr2.status = res;
+       break;
+       case NetValidatePasswordReset:
+               password = data_blob_const(r->in.req->req3.password.string,
+                                          r->in.req->req3.password.length);
+               res = samdb_check_password(&password,
+                                          pwInfo.password_properties,
+                                          pwInfo.min_password_length);
+               (*r->out.rep)->ctr3.status = res;
+       break;
+       default:
+               return NT_STATUS_INVALID_INFO_CLASS;
+       break;
+       }
+
        return NT_STATUS_OK;
 }